Welcome to World of IPTV

With

+23k members
+13k threads
+115k posts

we are the most popular IPTV community on the web. 

IMPORTANT NOTE:
WE HAVE RECENTLY NOTICED THAT TOO MANY DOUBLE FAKE ACCOUNTS ARE CREATED IN THE PAST.
ALL USER WITH DOUBLE ACCOUNT WILL GET BANNED WITHOUT NOTICEMENT.

Join now to the World of IPTV

Forum Rules

Before you start, check out the forum rules first

Account upgrade

Upgrade your account to get access to full features

Advertising

Would you like to place your advertisement with us ?

Resources Manager

Hundreds of IPTV scripts and apps are available for download

Tutorial XUIONE HACKING PROTECTION!

netteflix

Extended Member
Ext. Member
Joined
Apr 19, 2020
Messages
75
Reaction score
28
Points
29
Location
Turkey
Hey folks,

(Please share with your friends whoever uses XUIONE,22F,Mods,etc...)

[LIKES=]You've probably heard that some piece of crap recently exploited a few vulnerabilities in XUIONE, hacked into the system, and demanded 1000 euros in ransom after taking control of the database. Well, I’m here to tell you NOT to give this motherfucker even a penny. I’m offering you a 100% foolproof solution to bury these losers in the trash heap of history. If you follow these steps, your XUIONE panel will be safe and sound.

Step 1 - Don’t use SSL! Remove OpenSSL and close any unnecessary open ports!

Run:

Bash:
apt remove openssl -y

Now, let’s clean up unnecessary lines from your nginx.conf file located inside nginx_rtmp.

Open the file:

Bash:
nano /home/xui/bin/nginx_rtmp/conf/nginx.conf


Delete everything except the following lines:

Bash:
user xui;
worker_processes  auto;
worker_rlimit_nofile 300000;

events {
    worker_connections  16000;
    use epoll;
    accept_mutex on;
    multi_accept on;
}

Step 2 - Restrict database access to only LB IPs and your IP!

Even if someone somehow gets your database credentials, they won’t be able to access it!

Create a shell script, for example, block.sh, and add the following content:

First, let's learn where's your iptables?
Bash:
which iptables

mine is in /sbin/iptables so create the bash script (block.sh)

Bash:
/sbin/iptables -I INPUT 1 -p tcp -s mainIP --dport 3306 -j ACCEPT
/sbin/iptables -I INPUT 2 -p tcp -s BalanceIP1 --dport 3306 -j ACCEPT
/sbin/iptables -I INPUT 3 -p tcp -s BalanceIP2 --dport 3306 -j ACCEPT
/sbin/iptables -I INPUT 4 -p tcp -s BalanceIP3 --dport 3306 -j ACCEPT
/sbin/iptables -I INPUT 5 -p tcp -s YourLOCALIP --dport 3306 -j ACCEPT
/sbin/iptables -I INPUT 6 -p tcp --dport 3306 -j DROP
Replace the IP addresses with your own and save the file.

Then, make it executable and run it:

Bash:
chmod +x block.sh
./block.sh

This will block port 3306 (MySQL port) from any IP address except the ones you've specified.

So folks, follow these steps and you won’t give this loser even a penny while keeping your system secure!

Please ask if you need anything else! I'll do my best for you against that kind of motherfuckers. Hehe[/LIKES]
 
Last edited:

seagate

Extended Member
Ext. Member
Joined
Sep 24, 2019
Messages
39
Reaction score
8
Points
19
Location
Malta
why exactly NOT to use OPENSSL?
is there a risk if almost the newest NGINX 1.26 with the new OPENSSL is used?
 

CentOS

Extended Member
Ext. Member
Joined
Oct 13, 2019
Messages
49
Reaction score
100
Points
44
Location
turkey
why exactly NOT to use OPENSSL?
is there a risk if almost the newest NGINX 1.26 with the new OPENSSL is used?
Please explain why

apt remove openssl -y

the openssl library inside the ubuntu package always has security fixes as long as you use a non-obsolete distro, so I don't see a problem
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

netteflix

Extended Member
Ext. Member
Joined
Apr 19, 2020
Messages
75
Reaction score
28
Points
29
Location
Turkey
Please explain why

apt remove openssl -y

the openssl library inside the ubuntu package always has security fixes as long as you use a non-obsolete distro, so I don't see a problem

There's SSL Vulnerabilities. Listening ssl ports and grabbing user info easily!
 

smart_tech

Extended Member
Ext. Member
Joined
Sep 28, 2019
Messages
38
Reaction score
50
Points
29
Location
south america
/sbin/iptables -I INPUT 1 -p tcp -s mainIP --dport 3306 -j ACCEPT /sbin/iptables -I INPUT 2 -p tcp -s BalanceIP1 --dport 3306 -j ACCEPT /sbin/iptables -I INPUT 3 -p tcp -s BalanceIP2 --dport 3306 -j ACCEPT /sbin/iptables -I INPUT 4 -p tcp -s BalanceIP3 --dport 3306 -j ACCEPT /sbin/iptables -I INPUT 5 -p tcp -s YourLOCALIP --dport 3306 -j ACCEPT /sbin/iptables -I INPUT 6 -p tcp --dport 3306 -j DROP

Where is says BalanceIP should I keep as it is or change to my LBs IPs?

Because I have done steps above but my dashboard become inaccessible.
 
Last edited:
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

DgBrasil

Extended Member
Ext. Member
Joined
Oct 21, 2019
Messages
71
Reaction score
507
Points
94
Location
Brazil
I already use the MySQL block, allowing access only to my fixed IP and to the LBs.
In addition, SSH access is only allowed to my IP on all machines.
 

TeslaVision

Basic Member
Basic Member
Ext. Member
Joined
Nov 6, 2021
Messages
68
Reaction score
19
Points
19
Location
France
Already explained that in different groups, on Telegram, Discord and some forums so i will repeat myself... This is not a hack or a xui.one new discovered breach... All people getting blackmailed have same thing in common they have at least one server from one of the knows scammers/liars... They just didn't wznt to stop there and blackmailing you... No one using servers they buy from me got "hacked" also no one using servers from real trusted sellers got "hacked"... So unfortunately they were able to steal your DB because tbey simply have easy access to your DB from at least one of the servers they sell to you...



Its always sad to hear such things but people come to me to buy servers from me after they finally saw that its better to maybe pay a little more but at least avoid lies, and scam... (and now blackmail...)



Good luck to anyone that got into this situation cause of those pieces of sh**...
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changglobize
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com

OneStage

Extended Member
Ext. Member
Joined
Oct 26, 2019
Messages
42
Reaction score
61
Points
29
Location
Pahames
  1. It is better to create your own vpn udp protocol for access ssh etc. via vpn but who does not want to
  2. Add crowdsec to protect your ports
  3. use Port knocking methode for ssh.
  4. Block all incoming and outgoing ports except the ports you are using.
  5. Check your logs daily.
  6. Do not touch a running system, if you have fixed it all, do not play with your system, buy another small server and do your tests there.
 
Last edited:

urgodfather

Extended Member
Ext. Member
Joined
Sep 22, 2019
Messages
2,101
Reaction score
5,972
Points
124
Location
neither here, nor there
 
shape1
shape2
shape3
shape4
shape5
shape6
Top
AdBlock Detected

We know, ad-blocking software do a great job at blocking ads. But our site is sponsored by advertising. 

For the best possible site experience please take a moment to disable your AdBlocker.
You can create a Account with us or if you already have account, you can prefer an Account Upgrade.

I've Disabled AdBlock    No Thanks